Results 81 to 90 of about 22,224 (372)

Single‐Cell Computational Frameworks for Quantifying BET Bromodomain Inhibitor Resistance and Screening Re‐Sensitizer Drugs in Triple‐Negative Breast Cancer

open access: yesAdvanced Science, EarlyView.
To combat BET inhibitor resistance in triple‐negative breast cancer, we developed two single‐cell computational frameworks. FR20 quantifies resistance by integrating ferroptosis‐related gene signatures, while D‐FR20 screens for potential re‐sensitizers.
Haizhou Liu   +6 more
wiley   +1 more source

Squill: Testing DBMS with Correctness Feedback and Accurate Instantiation

open access: yesApplied Sciences, 2023
Database Management Systems (DBMSs) are the core of management information systems. Thus, detecting security bugs or vulnerabilities of DBMSs is an essential task.
Shihao Wen, Peng Jia, Pin Yang, Chi Hu
doaj   +1 more source

CROWBAR: Natively Fuzzing Trusted Applications Using ARM CoreSight [PDF]

open access: hybrid, 2023
Haoqi Shan   +6 more
openalex   +1 more source

ZSL Orchestrates Synaptonemal Complex Assembly as a Central Region Scaffold to Ensure Synapsis Fidelity and Crossover Control in Polyploid Meiosis

open access: yesAdvanced Science, EarlyView.
A central molecular adaptor, ZSL, is identified that links transverse filaments ZYP1 to central element SCEP1/2 to drive synaptonemal complex assembly in Brassica napus. Loss of ZSL abolishes synaptonemal complex formation, disrupts meiotic chromosome segregation, and markedly increases crossovers, providing mechanistic insight into meiotic fidelity ...
Miaowei Geng   +16 more
wiley   +1 more source

Highly Efficient and Environmentally Stable Radiative Cooling Fabric: Integrating Photoluminescence and Hierarchical Core–Shell Fibers

open access: yesAdvanced Science, EarlyView.
A scalable radiative cooling fabric engineered with a multi‐layer assembly core–shell structure and integrated photoluminescent materials is reported. The fabric exhibits remarkable environmental stability, including UV resistance, mechanical durability, hydrophobicity, stain resistance, thermal stability, and flame retardancy, demonstrating its ...
Hongtao Liu   +8 more
wiley   +1 more source

Grammar-aware test case trimming for efficient hybrid fuzzing

open access: yesJournal of King Saud University: Computer and Information Sciences
In recent years, hybrid fuzzing has garnered significant attention by combining the benefits of both fuzzing and concolic execution. However, existing hybrid fuzzing techniques face problems such as the performance overhead of concolic execution and low ...
Yiru Zhao, Long Gao, Qihan Wan, Lei Zhao
doaj   +1 more source

FIRMCORN: Vulnerability-Oriented Fuzzing of IoT Firmware via Optimized Virtual Execution

open access: yesIEEE Access, 2020
The security situation of the Internet of Things (IoT) is particularly severe, and a large number of IoT devices are prone to vulnerabilities. In this study, we present FIRMCORN, the first vulnerability-oriented fuzzer for IoT firmware.
Zhijie Gui   +3 more
doaj   +1 more source

Energies of B_s meson excited states - a lattice study

open access: yes, 2008
This is a follow-up to our earlier work on the energies and radial distributions of heavy-light mesons. The heavy quark is taken to be static (infinitely heavy) and the light quark has a mass about that of the strange quark.
A. M. Green   +4 more
core   +1 more source

Ultra‐Wide‐Field Noninvasive Imaging Through Scattering Media Via Physics‐Guided Deep Learning

open access: yesAdvanced Science, EarlyView.
We propose a physics‐guided adaptive dual‐domain learning method for ultra‐wide‐field noninvasive imaging through scattering media, namely UNI‐Net. Our method not only reduces the requirement for real experimental data by an order of magnitude but also enables clear imaging of complex scenes with an ultra‐large field of view, which is 164 times the OME
Lintao Peng   +5 more
wiley   +1 more source

A Novel Seed Generation Approach for Vulnerability Mining Based on Generative Adversarial Networks and Attention Mechanisms

open access: yesMathematics
Coverage-guided fuzzing has been widely applied in software error and security vulnerability detection. The fuzzing technique based on AFL (American Fuzzy Loop) is a common coverage-guided fuzzing method.
Chunlai Du   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy